Author:
Gong Liangyi,Wang Chundong,Yang Hong,Li Zhiyuan,Zhao Zhentang
Funder
the Foundation of Educational Commission of Tianjin,China
the General Project of Tianjin Municipal Science and Technology Commission
the Major Project of Tianjin Municipal Science and Technology Commission
NSFC:the United Foundation of General Technology and Fundamental Research
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Hardware and Architecture,Information Systems,Software
Reference36 articles.
1. Abbas NI, Ilkan M (2015) Fuzzy approach to improving route stability of the aodv routing protocol. EURASIP J Wirel Commun Netw 2015(1):1–11
2. Ahmed A, Bakar KA, Channa MI, Khan AW, Haseeb K (2017) Energy-aware and secure routing with trust for disaster response wireless sensor network. Peer-to-Peer Networking and Applications 14(4):1–22
3. Cai Z, Yan H, Li P, Huang ZA, Gao C (2017) Towards secure and flexible ehr sharing in mobile health cloud under static assumptions. Clust Comput 20(3):1–8
4. Chen Wang Jian Shen QLYR, Li T (2018) A novel security scheme based on instant encrypted transmission for internet of things. Security and Communication Networks 2018: Article ID 3680851
5. Dhananjayan G, Subbiah J (2016) T2ar: trust-aware ad-hoc routing protocol for manet. SpringerPlus 5 (1):1–16
Cited by
10 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. An Approach Toward Packet Routing in the OSPF-based Network with a Distrustful Router;WSEAS TRANSACTIONS ON INFORMATION SCIENCE AND APPLICATIONS;2023-11-03
2. Mobility and Behavior based Trustable Routing in Mobile Wireless Sensor Network;2023 7th International Conference on Computing Methodologies and Communication (ICCMC);2023-02-23
3. Interior Angle Computation for detecting Adversary Sensor in Wireless Sensor Networks;2023 International Conference on Intelligent and Innovative Technologies in Computing, Electrical and Electronics (IITCEE);2023-01-27
4. Performance Improvements of Routing Protocol by Blackhole Detection using Trust Based Scheme;2022 4th IEEE Middle East and North Africa COMMunications Conference (MENACOMM);2022-12-06
5. Review on Security Issues and Applications of Trust Mechanism in Wireless Sensor Networks;Computational Intelligence and Neuroscience;2022-09-27